VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202104-0674 CVE-2021-21533 Wyse Management Suite  Input confirmation vulnerability CVSS V2: 4.0
CVSS V3: 4.3
Severity: MEDIUM
Wyse Management Suite versions up to 3.2 contains a vulnerability wherein a malicious authenticated user can cause a denial of service in the job status retrieval page, also affecting other users that would have normally access to the same subset of job details. Wyse Management Suite Is vulnerable to input validation.Denial of service (DoS) It may be put into a state
VAR-202104-0673 CVE-2021-21532 Dell Wyse ThinOS  Input confirmation vulnerability CVSS V2: 5.8
CVSS V3: 6.3
Severity: MEDIUM
Dell Wyse ThinOS 8.6 MR9 contains remediation for an improper management server validation vulnerability that could be potentially exploited to redirect a client to an attacker-controlled management server, thus allowing the attacker to change the device configuration or certificate file. Dell Wyse ThinOS Is vulnerable to input validation.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Dell Wyse ThinOS is a dedicated operating system for Dell servers developed by Dell in the United States
VAR-202104-0669 CVE-2021-21529 Dell System Update  Resource Depletion Vulnerability CVSS V2: 4.9
CVSS V3: 5.5
Severity: MEDIUM
Dell System Update (DSU) 1.9 and earlier versions contain a denial of service vulnerability. A local authenticated malicious user with low privileges may potentially exploit this vulnerability to cause the system to run out of memory by running multiple instances of the vulnerable application. Dell System Update is an application software package of Dell (Dell). Provide application update function
VAR-202104-0634 CVE-2021-1755 Apple macOS Big Sur Security hole CVSS V2: 2.1
CVSS V3: 2.4
Severity: LOW
A lock screen issue allowed access to contacts on a locked device. This issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1. A person with physical access to an iOS device may be able to access contacts from the lock screen
VAR-202104-0589 CVE-2021-1803 macOS  Vulnerability in CVSS V2: 4.3
CVSS V3: 3.3
Severity: LOW
The issue was addressed with improved permissions logic. This issue is fixed in macOS Big Sur 11.0.1. A local application may be able to enumerate the user's iCloud documents. macOS Exists in unspecified vulnerabilities.Information may be obtained. Apple macOS Big Sur versions prior to 11.0.1 have a permission and access control issue vulnerability, which stems from the fact that local applications can enumerate the user's iCloud documents
VAR-202104-0451 CVE-2020-9930 macOS  Out-of-bounds read vulnerability in CVSS V2: 6.6
CVSS V3: 7.1
Severity: HIGH
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.6, Security Update 2020-004 Mojave, Security Update 2020-004 High Sierra. A local user may be able to cause unexpected system termination or read kernel memory. macOS Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
VAR-202104-0450 CVE-2020-9926 plural  Apple  Product Use of Freed Memory Vulnerability CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, iCloud for Windows 7.20, macOS Catalina 10.15.6, Security Update 2020-004 Mojave, Security Update 2020-004 High Sierra. Processing maliciously crafted XML may lead to an unexpected application termination or arbitrary code execution. plural Apple The product contains a usage of freed memory vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Both Apple iOS and Apple tvOS are products of Apple Inc. Apple iOS is an operating system developed for mobile devices. Apple tvOS is a smart TV operating system
VAR-202104-0208 CVE-2020-29615 plural  Apple  Product out-of-bounds read vulnerability CVSS V2: 4.3
CVSS V3: 5.5
Severity: MEDIUM
An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 7.2, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. Processing a maliciously crafted image may lead to a denial of service. plural Apple The product contains an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Apple watchOS is a smart watch operating system developed by Apple (Apple)
VAR-202104-0199 CVE-2020-29639 iOS  and  iPadOS  Out-of-bounds read vulnerability in CVSS V2: 4.3
CVSS V3: 5.5
Severity: MEDIUM
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0. Processing a maliciously crafted font may result in the disclosure of process memory. Both Apple iOS and Apple iPadOS are products of Apple (Apple). Apple iOS is an operating system developed for mobile devices. Apple iPadOS is an operating system for iPad tablets
VAR-202104-0197 CVE-2020-29625 macOS  Vulnerability in CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. Processing a maliciously crafted image may lead to arbitrary code execution. macOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202104-0179 CVE-2020-27939 macOS  Vulnerability in CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. Processing a maliciously crafted image may lead to arbitrary code execution. macOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202104-0176 CVE-2020-27936 macOS  Out-of-bounds read vulnerability in CVSS V2: 6.6
CVSS V3: 7.1
Severity: HIGH
An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. A local user may be able to cause unexpected system termination or read kernel memory. macOS Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. Apple macOS Big Sur is a mobile application APP of Apple (Apple)
VAR-202104-0175 CVE-2020-27935 plural  Apple  Product vulnerabilities CVSS V2: 4.3
CVSS V3: 6.3
Severity: MEDIUM
Multiple issues were addressed with improved logic. This issue is fixed in iOS 14.2 and iPadOS 14.2, macOS Big Sur 11.0.1, watchOS 7.1, tvOS 14.2. A sandboxed process may be able to circumvent sandbox restrictions. plural Apple There are unspecified vulnerabilities in the product.Information may be tampered with
VAR-202104-0174 CVE-2020-27933 Apple Buffer error vulnerabilities in multiple products CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, iCloud for Windows 7.20, watchOS 6.2.8, tvOS 13.4.8, macOS Catalina 10.15.6, Security Update 2020-004 Mojave, Security Update 2020-004 High Sierra. Processing a maliciously crafted image may lead to arbitrary code execution
VAR-202104-0154 CVE-2020-27893 macOS  Vulnerability in CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
An issue existed in screen sharing. This issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1. A user with screen sharing access may be able to view another user's screen. macOS Exists in unspecified vulnerabilities.Information may be obtained
VAR-202104-0042 CVE-2019-20466 Sannce Smart HD Wifi Security Camera EAN 2 950004 595317  Vulnerability in using weak password hashes on devices CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
An issue was discovered on Sannce Smart HD Wifi Security Camera EAN 2 950004 595317 devices. A local attacker with the "default" account is capable of reading the /etc/passwd file, which contains a weakly hashed root password. By taking this hash and cracking it, the attacker can obtain root rights on the device. ------------------------------------------ [Vulnerability Type] Insecure Permissions ------------------------------------------ [Vendor of Product] Sannce ------------------------------------------ [Affected Product Code Base] Sannce Smart HD Wifi Security Camera - EAN nr: 2 950004 595317 ------------------------------------------ [Affected Component] Root user through file /etc/passwd ------------------------------------------ [Attack Type] Local ------------------------------------------ [Impact Escalation of Privileges] true ------------------------------------------ [Attack Vectors] To exploit the vulnerability, someone must be able to get local presence on the device. e.g. through command injection or by using the telnet interface as a low-privileged user. ------------------------------------------ [Has vendor confirmed or acknowledged the vulnerability?] true ------------------------------------------ [Discoverer] Willem Westerhof, Jasper Nota, Martijn Baalman from Qbit cyber security in cooperation with the Dutch Consumer organisation. ------------------------------------------ [Reference] https://www.sannce.com Use CVE-2019-20466
VAR-202104-0041 CVE-2019-20465 Sannce Smart HD Wifi Security Camera EAN 2 950004 595317  Vulnerabilities in devices CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
An issue was discovered on Sannce Smart HD Wifi Security Camera EAN 2 950004 595317 devices. It is possible (using TELNET without a password) to control the camera's pan/zoom/tilt functionality. ------------------------------------------ [Vulnerability Type] Incorrect Access Control ------------------------------------------ [Vendor of Product] Sannce ------------------------------------------ [Affected Product Code Base] Sannce Smart HD Wifi Security Camera - EAN nr: 2 950004 595317 ------------------------------------------ [Affected Component] Videostream of camera ------------------------------------------ [Attack Type] Remote ------------------------------------------ [Impact Escalation of Privileges] true ------------------------------------------ [Impact Information Disclosure] true ------------------------------------------ [Attack Vectors] An attacker simply needs to be able to connect to the device over the network. ------------------------------------------ [Has vendor confirmed or acknowledged the vulnerability?] true ------------------------------------------ [Discoverer] Willem Westerhof, Jasper Nota, Martijn Baalman from Qbit cyber security in cooperation with the Dutch Consumer organisation. ------------------------------------------ [Reference] https://www.sannce.com Use CVE-2019-20465
VAR-202104-0040 CVE-2019-20464 Sannce Smart HD Wifi Security Camera EAN 2 950004 595317  Authentication vulnerability in device CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
An issue was discovered on Sannce Smart HD Wifi Security Camera EAN 2 950004 595317 devices. By default, a mobile application is used to stream over UDP. However, the device offers many more services that also enable streaming. Although the service used by the mobile application requires a password, the other streaming services do not. By initiating communication on the RTSP port, an attacker can obtain access to the video feed without authenticating. ------------------------------------------ [Vulnerability Type] Incorrect Access Control ------------------------------------------ [Vendor of Product] Sannce ------------------------------------------ [Affected Product Code Base] Sannce Smart HD Wifi Security Camera - EAN nr: 2 950004 595317 ------------------------------------------ [Affected Component] Videostream of camera ------------------------------------------ [Attack Type] Remote ------------------------------------------ [Impact Escalation of Privileges] true ------------------------------------------ [Impact Information Disclosure] true ------------------------------------------ [Attack Vectors] An attacker simply needs to be able to connect to the device over the network. ------------------------------------------ [Has vendor confirmed or acknowledged the vulnerability?] true ------------------------------------------ [Discoverer] Willem Westerhof, Jasper Nota, Martijn Baalman from Qbit cyber security in cooperation with the Dutch Consumer organisation. ------------------------------------------ [Reference] https://www.sannce.com Use CVE-2019-20464
VAR-202104-0039 CVE-2019-20463 Sannce Smart HD Wifi Security Camera EAN 2 950004 595317  Vulnerabilities in devices CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
An issue was discovered on Sannce Smart HD Wifi Security Camera EAN 2 950004 595317 devices. A crash and reboot can be triggered by crafted IP traffic, as demonstrated by the Nikto vulnerability scanner. For example, sending the 111111 string to UDP port 20188 causes a reboot. To deny service for a long time period, the crafted IP traffic may be sent periodically. ------------------------------------------ [VulnerabilityType Other] Denial of Service due to incorrect error handling ------------------------------------------ [Vendor of Product] Sannce ------------------------------------------ [Affected Product Code Base] Sannce Smart HD Wifi Security Camera - EAN nr: 2 950004 595317 ------------------------------------------ [Affected Component] Webserver, custom UDP handling binary. ------------------------------------------ [Attack Type] Remote ------------------------------------------ [Impact Denial of Service] true ------------------------------------------ [Attack Vectors] Any attacker capable of reaching the device with a network packet is capable of causing a DoS. ------------------------------------------ [Has vendor confirmed or acknowledged the vulnerability?] true ------------------------------------------ [Discoverer] Willem Westerhof, Jasper Nota, Martijn Baalman from Qbit cyber security in cooperation with the Dutch Consumer organisation. ------------------------------------------ [Reference] https://www.sannce.com Use CVE-2019-20463
VAR-202104-0019 CVE-2020-11925 Luvion Grand Elite 3 Connect  Vulnerability regarding inadequate protection of credentials in CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
An issue was discovered in Luvion Grand Elite 3 Connect through 2020-02-25. Authentication to the device is based on a username and password. The root credentials are the same across all devices of this model. Luvion Grand Elite 3 Connect Exists in an inadequate protection of credentials.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. ------------------------------------------ [Vulnerability Type] Incorrect Access Control ------------------------------------------ [Vendor of Product] Luvion ------------------------------------------ [Affected Product Code Base] Luvion Grand Elite 3 Connect - Could not be determined ------------------------------------------ [Affected Component] Underlying linux system. ------------------------------------------ [Attack Type] Remote ------------------------------------------ [Impact Code execution] true ------------------------------------------ [Attack Vectors] Any attacker with network access can exploit this vulnerability. ------------------------------------------ [Discoverer] Willem Westerhof, Jasper Nota, Jim Blankendaal, Martijn Baalman from Qbit in assignment of Consumentenbond. ------------------------------------------ [Reference] N/A Use CVE-2020-11925